GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Wiley ; 2016
    In:  Security and Communication Networks Vol. 9, No. 18 ( 2016-12), p. 6335-6350
    In: Security and Communication Networks, Wiley, Vol. 9, No. 18 ( 2016-12), p. 6335-6350
    Abstract: The reputation system is used to display the reputation of entities based on the ratings or appraisals given by users who have used or purchased those entities. Web service providers supply various reputation systems for their users. However, these promising reputation systems face some challenges. First, even though different persons have different preference and values (values are a person's beliefs about what things are good or bad), these systems still give the same rating to the same entity for all users. Second, they may be greatly influenced by Sybil attacks. In this paper, we propose a reputation system, called values‐based reputation system (VRS), to solve the aforementioned problems. VRS customizes the rating of an entity for each user based on the ratings of the entities provided by other users who have similar values or preference to the user. Experimental results on 256 users show that compared with existing reputation systems VRS is more robust to Sybil attacks and provides a recommendation rating that is closer to the rating given by the user after it used the related entity. Copyright © 2016 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2016
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Wiley ; 2020
    In:  International Journal of Communication Systems Vol. 33, No. 14 ( 2020-09-25)
    In: International Journal of Communication Systems, Wiley, Vol. 33, No. 14 ( 2020-09-25)
    Abstract: This paper proposes a passive user‐side solution, called Wi‐Fi legal access point (AP) finder (LAF), to the notorious evil twin access point problem, which in turn can result in diverse security problems, such as fraud, identity theft, and man‐in‐the‐middle attacks. Due to the severe security threats created by evil twins, many promising solutions have been proposed. However, the majority of these solutions are designed for the administrators of wireless networks, not for Wi‐Fi users. Hence, they are either too expensive or need some data that are usually not accessible to normal users. LAF utilizes the TCP three‐way handshake‐related packets and packet forwarding property created by evil twins to find legal APs, called good twins, at public hotspots or unencrypted WLANs; thus, it does not need any data or assistance from wireless network administrators. LAF does not send exploring packets actively; hence, evil twins cannot sense its existence. No matter when and where a user needs to utilize an AP to connect to the Internet at a hotspot, he can just use LAF to find out a legal AP to connect to. Experimental results show that LAF can quickly and accurately find legal APs after observing only a few packets.
    Type of Medium: Online Resource
    ISSN: 1074-5351 , 1099-1131
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2020
    detail.hit.zdb_id: 2024893-3
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Wiley ; 2015
    In:  Security and Communication Networks Vol. 8, No. 5 ( 2015-03-25), p. 715-726
    In: Security and Communication Networks, Wiley, Vol. 8, No. 5 ( 2015-03-25), p. 715-726
    Abstract: In this paper, we propose an automatic defense system, called Serum System, against scanning worms. The homeland security department of a country can use Serum System to protect its Internet infrastructure. When an infecting host is infecting a Serum System host, called Serum System Server (SSS), the SSS automatically replaces the shellcode inside the infecting string with its code (called serum code) and then uses the modified string (called serum string) to counterattack the infecting host and takes control of it. The serum code transforms the infecting host into a Serum System Client (SSC) that has the same functions as the SSS and is immune to the same worm. Therefore, infecting hosts attacking SSSs or SSCs will transform themselves into SSCs. We implemented Serum System on Linux and also built a mathematical model for Serum System to analyze its effectiveness and bandwidth savings. Our analyses show that with only a small number of SSSs and through chain counterattacks, Serum System can automatically and rapidly defeat related infected hosts. Compared with white worms whose spread cannot be controlled, Serum System only spreads on infected hosts. The amount of accumulative traffic saved by Serum System at time tick 450 reached 90%. Copyright © 2014 John Wiley & Sons, Ltd.
    Type of Medium: Online Resource
    ISSN: 1939-0114 , 1939-0122
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2015
    detail.hit.zdb_id: 2415104-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Clinical Genetics, Wiley, Vol. 51, No. 6 ( 2008-06-28), p. 370-374
    Type of Medium: Online Resource
    ISSN: 0009-9163 , 1399-0004
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2008
    detail.hit.zdb_id: 2004581-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2010
    In:  Journal of Biomedical Materials Research Part A Vol. 93A, No. 1 ( 2010-04), p. 115-122
    In: Journal of Biomedical Materials Research Part A, Wiley, Vol. 93A, No. 1 ( 2010-04), p. 115-122
    Abstract: Numerous studies about bone matrix fabrication focus on how the species and concentrations of components affect the cellular response. However, there are few studies that investigate how the related spatial arrangement of the components influences cellular activity. The aim of this work was to develop a novel method to biomimetically manufacture a three‐dimensional mineral bone matrix and study the effect of apatite‐collagen‐chondroitin sulfate (CS) microspheres on the adhesion rate and activity of osteoblast‐like cells. Although previous studies used a crosslinking agent or lyophilized methods to fabricated three‐dimensional collagen microspheres, we produced beads composed of collagen and CS under mild reaction conditions. This process not only maintains collagen self‐assembly into fibrils with a D‐periodic pattern ability but also simultaneously introduces two major native bone matrix elements, collagen and CS, into the beads. Furthermore, we mimic the native in vivo bone matrix formation process by the direct nucleation and growth of apatite crystals on collagen fibrils. The apatite crystals are similar in composition to human bone mineral via X‐ray diffraction and energy‐dispersive X‐ray spectrometric analysis. The cellular attachment rate of MG63 osteoblast‐like cells is significantly higher for collagen‐CS‐apatite gel beads than for collagen‐CS gel beads. In addition, with regard to the osteoblast bioactivity, we observed that alkaline phosphatase activity of MG63 cells on the collagen‐CS‐apatite gel beads higher than on the collagen‐CS gel beads on day 14. © 2009 Wiley Periodicals, Inc. J Biomed Mater Res, 2010
    Type of Medium: Online Resource
    ISSN: 1549-3296 , 1552-4965
    URL: Issue
    Language: English
    Publisher: Wiley
    Publication Date: 2010
    detail.hit.zdb_id: 1477192-5
    SSG: 12
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...